Skip to content
Open Access
  • Home
  • Collections
    • High Impact Articles
    • Jawi Collection
    • Malay Medicine
    • Forensic
  • Search Options
    • UiTM Open Access
    • Search by UiTM Scopus
    • Advanced Search
    • Search by Category
  • Discovery Service
    • Sources
    • UiTM Journals
    • List UiTM Journal in IR
    • Statistic
  • About
    • Open Access
    • Creative Commons Licenses
    • COKI | Malaysia Open Access
    • User Guide
    • Contact Us
    • Search Tips
    • FAQs
Advanced
  • Search
  • Whether using encryption in SC...
  • Cite this
  • Text this
  • Email this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
  • Permanent link
Whether using encryption in SCADA systems, the services performance requirements are still met in OT IT environment over an MPLS core network?

Whether using encryption in SCADA systems, the services performance requirements are still met in OT IT environment over an MPLS core network?

A Research Project Abstract submitted in fulfillment of the requirements for Master of Science in Engineering [Electrical]: Telecommunications at the University Of The Witwatersrand, Johannesburg 07 June 2016 === Utilities use Supervisory Control and Data Acquisition systems as their industria...

Full description

Bibliographic Details
Main Author: Chego, Lloyd
Format: Others
Language:en
Published: 2016
Subjects:
Supervisory control systems > Security measures
Computer networks > Security measures
Industries > Security measures
Data encryption (Computer science)
Automation > Security measures
Process control > Security measures
Computer security
Online Access:Chego, Lloyd (2016) Whether using encryption in SCADA systems, the services performance requirements are still met in OT IT environment over an MPLS core network?, University of Witwatersrand, Johannesburg, <http://wiredspace.wits.ac.za/handle/10539/21050>
http://hdl.handle.net/10539/21050
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

Chego, Lloyd (2016) Whether using encryption in SCADA systems, the services performance requirements are still met in OT IT environment over an MPLS core network?, University of Witwatersrand, Johannesburg, <http://wiredspace.wits.ac.za/handle/10539/21050>
http://hdl.handle.net/10539/21050

Similar Items

  • Data encryption using RSA public-key cryptosystem
    by: Clevenger, Mark Allen
    Published: (2011)
  • IP traceback marking scheme based DDoS defense.
    Published: (2005)
  • An evaluation of security issues in cloud-based file sharing technologies
    by: Fana, Akhona
    Published: (2015)
  • Information security in a distributed banking environment, with specific reference to security protocols.
    by: Van Buuren, Suzi
    Published: (2012)
  • Data-centric security : towards a utopian model for protecting corporate data on mobile devices
    by: Mayisela, Simphiwe Hector
    Published: (2014)

© 2020 | Services hosted by the Perpustakaan Tun Abdul Razak, | Universiti Teknologi MARA | Disclaimer


Loading...